mirror of
https://github.com/followmsi/android_kernel_google_msm.git
synced 2024-11-06 23:17:41 +00:00
Revert "net: core: Support UID-based routing."
This reverts commit dbadd302523011ab746840885b93e8bd0b2ff499. Change-Id: I8d996d5a84a3203443987c844d10534cd0dfc2c1
This commit is contained in:
parent
8ab95e11f6
commit
f33f0fc3ed
25 changed files with 14 additions and 123 deletions
|
@ -49,8 +49,6 @@ enum {
|
|||
FRA_TABLE, /* Extended table id */
|
||||
FRA_FWMASK, /* mask for netfilter mark */
|
||||
FRA_OIFNAME,
|
||||
FRA_UID_START, /* UID range */
|
||||
FRA_UID_END,
|
||||
__FRA_MAX
|
||||
};
|
||||
|
||||
|
|
|
@ -283,8 +283,6 @@ enum rtattr_type_t {
|
|||
RTA_MP_ALGO, /* no longer used */
|
||||
RTA_TABLE,
|
||||
RTA_MARK,
|
||||
RTA_MFC_STATS, /* not used - backported from the future */
|
||||
RTA_UID,
|
||||
__RTA_MAX
|
||||
};
|
||||
|
||||
|
|
|
@ -23,8 +23,6 @@ struct fib_rule {
|
|||
struct fib_rule __rcu *ctarget;
|
||||
char iifname[IFNAMSIZ];
|
||||
char oifname[IFNAMSIZ];
|
||||
uid_t uid_start;
|
||||
uid_t uid_end;
|
||||
struct rcu_head rcu;
|
||||
struct net * fr_net;
|
||||
};
|
||||
|
@ -81,9 +79,7 @@ struct fib_rules_ops {
|
|||
[FRA_FWMARK] = { .type = NLA_U32 }, \
|
||||
[FRA_FWMASK] = { .type = NLA_U32 }, \
|
||||
[FRA_TABLE] = { .type = NLA_U32 }, \
|
||||
[FRA_GOTO] = { .type = NLA_U32 }, \
|
||||
[FRA_UID_START] = { .type = NLA_U32 }, \
|
||||
[FRA_UID_END] = { .type = NLA_U32 }
|
||||
[FRA_GOTO] = { .type = NLA_U32 }
|
||||
|
||||
static inline void fib_rule_get(struct fib_rule *rule)
|
||||
{
|
||||
|
|
|
@ -23,7 +23,6 @@ struct flowi_common {
|
|||
#define FLOWI_FLAG_PRECOW_METRICS 0x02
|
||||
#define FLOWI_FLAG_CAN_SLEEP 0x04
|
||||
__u32 flowic_secid;
|
||||
uid_t flowic_uid;
|
||||
};
|
||||
|
||||
union flowi_uli {
|
||||
|
@ -60,7 +59,6 @@ struct flowi4 {
|
|||
#define flowi4_proto __fl_common.flowic_proto
|
||||
#define flowi4_flags __fl_common.flowic_flags
|
||||
#define flowi4_secid __fl_common.flowic_secid
|
||||
#define flowi4_uid __fl_common.flowic_uid
|
||||
|
||||
/* (saddr,daddr) must be grouped, same order as in IP header */
|
||||
__be32 saddr;
|
||||
|
@ -80,8 +78,7 @@ static inline void flowi4_init_output(struct flowi4 *fl4, int oif,
|
|||
__u32 mark, __u8 tos, __u8 scope,
|
||||
__u8 proto, __u8 flags,
|
||||
__be32 daddr, __be32 saddr,
|
||||
__be16 dport, __be16 sport,
|
||||
uid_t uid)
|
||||
__be16 dport, __be16 sport)
|
||||
{
|
||||
fl4->flowi4_oif = oif;
|
||||
fl4->flowi4_iif = 0;
|
||||
|
@ -91,7 +88,6 @@ static inline void flowi4_init_output(struct flowi4 *fl4, int oif,
|
|||
fl4->flowi4_proto = proto;
|
||||
fl4->flowi4_flags = flags;
|
||||
fl4->flowi4_secid = 0;
|
||||
fl4->flowi4_uid = uid;
|
||||
fl4->daddr = daddr;
|
||||
fl4->saddr = saddr;
|
||||
fl4->fl4_dport = dport;
|
||||
|
@ -119,7 +115,6 @@ struct flowi6 {
|
|||
#define flowi6_proto __fl_common.flowic_proto
|
||||
#define flowi6_flags __fl_common.flowic_flags
|
||||
#define flowi6_secid __fl_common.flowic_secid
|
||||
#define flowi6_uid __fl_common.flowic_uid
|
||||
struct in6_addr daddr;
|
||||
struct in6_addr saddr;
|
||||
__be32 flowlabel;
|
||||
|
@ -163,7 +158,6 @@ struct flowi {
|
|||
#define flowi_proto u.__fl_common.flowic_proto
|
||||
#define flowi_flags u.__fl_common.flowic_flags
|
||||
#define flowi_secid u.__fl_common.flowic_secid
|
||||
#define flowi_uid u.__fl_common.flowic_uid
|
||||
} __attribute__((__aligned__(BITS_PER_LONG/8)));
|
||||
|
||||
static inline struct flowi *flowi4_to_flowi(struct flowi4 *fl4)
|
||||
|
|
|
@ -167,7 +167,6 @@ struct ip_reply_arg {
|
|||
/* -1 if not needed */
|
||||
int bound_dev_if;
|
||||
u8 tos;
|
||||
uid_t uid;
|
||||
};
|
||||
|
||||
#define IP_REPLY_ARG_NOSRCCHECK 1
|
||||
|
|
|
@ -60,7 +60,6 @@ struct rtable {
|
|||
int rt_iif;
|
||||
int rt_oif;
|
||||
__u32 rt_mark;
|
||||
uid_t rt_uid;
|
||||
|
||||
/* Info on neighbour */
|
||||
__be32 rt_gateway;
|
||||
|
@ -147,7 +146,7 @@ static inline struct rtable *ip_route_output_ports(struct net *net, struct flowi
|
|||
flowi4_init_output(fl4, oif, sk ? sk->sk_mark : 0, tos,
|
||||
RT_SCOPE_UNIVERSE, proto,
|
||||
sk ? inet_sk_flowi_flags(sk) : 0,
|
||||
daddr, saddr, dport, sport, sk ? sock_i_uid(sk) : 0);
|
||||
daddr, saddr, dport, sport);
|
||||
if (sk)
|
||||
security_sk_classify_flow(sk, flowi4_to_flowi(fl4));
|
||||
return ip_route_output_flow(net, fl4, sk);
|
||||
|
@ -251,8 +250,7 @@ static inline void ip_route_connect_init(struct flowi4 *fl4, __be32 dst, __be32
|
|||
flow_flags |= FLOWI_FLAG_CAN_SLEEP;
|
||||
|
||||
flowi4_init_output(fl4, oif, sk->sk_mark, tos, RT_SCOPE_UNIVERSE,
|
||||
protocol, flow_flags, dst, src, dport, sport,
|
||||
sock_i_uid(sk));
|
||||
protocol, flow_flags, dst, src, dport, sport);
|
||||
}
|
||||
|
||||
static inline struct rtable *ip_route_connect(struct flowi4 *fl4,
|
||||
|
|
|
@ -17,12 +17,6 @@
|
|||
#include <net/sock.h>
|
||||
#include <net/fib_rules.h>
|
||||
|
||||
#define INVALID_UID ((uid_t) -1)
|
||||
#define uid_valid(uid) ((uid) != -1)
|
||||
#define uid_lte(a, b) ((a) <= (b))
|
||||
#define uid_eq(a, b) ((a) == (b))
|
||||
#define uid_gte(a, b) ((a) >= (b))
|
||||
|
||||
int fib_default_rule_add(struct fib_rules_ops *ops,
|
||||
u32 pref, u32 table, u32 flags)
|
||||
{
|
||||
|
@ -37,8 +31,6 @@ int fib_default_rule_add(struct fib_rules_ops *ops,
|
|||
r->pref = pref;
|
||||
r->table = table;
|
||||
r->flags = flags;
|
||||
r->uid_start = INVALID_UID;
|
||||
r->uid_end = INVALID_UID;
|
||||
r->fr_net = hold_net(ops->fro_net);
|
||||
|
||||
/* The lock is not required here, the list in unreacheable
|
||||
|
@ -185,23 +177,6 @@ void fib_rules_unregister(struct fib_rules_ops *ops)
|
|||
}
|
||||
EXPORT_SYMBOL_GPL(fib_rules_unregister);
|
||||
|
||||
static inline uid_t fib_nl_uid(struct nlattr *nla)
|
||||
{
|
||||
return nla_get_u32(nla);
|
||||
}
|
||||
|
||||
static int nla_put_uid(struct sk_buff *skb, int idx, uid_t uid)
|
||||
{
|
||||
return nla_put_u32(skb, idx, uid);
|
||||
}
|
||||
|
||||
static int fib_uid_range_match(struct flowi *fl, struct fib_rule *rule)
|
||||
{
|
||||
return (!uid_valid(rule->uid_start) && !uid_valid(rule->uid_end)) ||
|
||||
(uid_gte(fl->flowi_uid, rule->uid_start) &&
|
||||
uid_lte(fl->flowi_uid, rule->uid_end));
|
||||
}
|
||||
|
||||
static int fib_rule_match(struct fib_rule *rule, struct fib_rules_ops *ops,
|
||||
struct flowi *fl, int flags)
|
||||
{
|
||||
|
@ -216,9 +191,6 @@ static int fib_rule_match(struct fib_rule *rule, struct fib_rules_ops *ops,
|
|||
if ((rule->mark ^ fl->flowi_mark) & rule->mark_mask)
|
||||
goto out;
|
||||
|
||||
if (!fib_uid_range_match(fl, rule))
|
||||
goto out;
|
||||
|
||||
ret = ops->match(rule, fl, flags);
|
||||
out:
|
||||
return (rule->flags & FIB_RULE_INVERT) ? !ret : ret;
|
||||
|
@ -389,19 +361,6 @@ static int fib_nl_newrule(struct sk_buff *skb, struct nlmsghdr* nlh, void *arg)
|
|||
} else if (rule->action == FR_ACT_GOTO)
|
||||
goto errout_free;
|
||||
|
||||
/* UID start and end must either both be valid or both unspecified. */
|
||||
rule->uid_start = rule->uid_end = INVALID_UID;
|
||||
if (tb[FRA_UID_START] || tb[FRA_UID_END]) {
|
||||
if (tb[FRA_UID_START] && tb[FRA_UID_END]) {
|
||||
rule->uid_start = fib_nl_uid(tb[FRA_UID_START]);
|
||||
rule->uid_end = fib_nl_uid(tb[FRA_UID_END]);
|
||||
}
|
||||
if (!uid_valid(rule->uid_start) ||
|
||||
!uid_valid(rule->uid_end) ||
|
||||
!uid_lte(rule->uid_start, rule->uid_end))
|
||||
goto errout_free;
|
||||
}
|
||||
|
||||
err = ops->configure(rule, skb, frh, tb);
|
||||
if (err < 0)
|
||||
goto errout_free;
|
||||
|
@ -508,14 +467,6 @@ static int fib_nl_delrule(struct sk_buff *skb, struct nlmsghdr* nlh, void *arg)
|
|||
(rule->mark_mask != nla_get_u32(tb[FRA_FWMASK])))
|
||||
continue;
|
||||
|
||||
if (tb[FRA_UID_START] &&
|
||||
!uid_eq(rule->uid_start, fib_nl_uid(tb[FRA_UID_START])))
|
||||
continue;
|
||||
|
||||
if (tb[FRA_UID_END] &&
|
||||
!uid_eq(rule->uid_end, fib_nl_uid(tb[FRA_UID_END])))
|
||||
continue;
|
||||
|
||||
if (!ops->compare(rule, frh, tb))
|
||||
continue;
|
||||
|
||||
|
@ -570,9 +521,7 @@ static inline size_t fib_rule_nlmsg_size(struct fib_rules_ops *ops,
|
|||
+ nla_total_size(4) /* FRA_PRIORITY */
|
||||
+ nla_total_size(4) /* FRA_TABLE */
|
||||
+ nla_total_size(4) /* FRA_FWMARK */
|
||||
+ nla_total_size(4) /* FRA_FWMASK */
|
||||
+ nla_total_size(4) /* FRA_UID_START */
|
||||
+ nla_total_size(4); /* FRA_UID_END */
|
||||
+ nla_total_size(4); /* FRA_FWMASK */
|
||||
|
||||
if (ops->nlmsg_payload)
|
||||
payload += ops->nlmsg_payload(rule);
|
||||
|
@ -630,12 +579,6 @@ static int fib_nl_fill_rule(struct sk_buff *skb, struct fib_rule *rule,
|
|||
if (rule->target)
|
||||
NLA_PUT_U32(skb, FRA_GOTO, rule->target);
|
||||
|
||||
if (uid_valid(rule->uid_start))
|
||||
nla_put_uid(skb, FRA_UID_START, rule->uid_start);
|
||||
|
||||
if (uid_valid(rule->uid_end))
|
||||
nla_put_uid(skb, FRA_UID_END, rule->uid_end);
|
||||
|
||||
if (ops->fill(rule, skb, frh) < 0)
|
||||
goto nla_put_failure;
|
||||
|
||||
|
|
|
@ -481,7 +481,6 @@ const struct nla_policy rtm_ipv4_policy[RTA_MAX + 1] = {
|
|||
[RTA_METRICS] = { .type = NLA_NESTED },
|
||||
[RTA_MULTIPATH] = { .len = sizeof(struct rtnexthop) },
|
||||
[RTA_FLOW] = { .type = NLA_U32 },
|
||||
[RTA_UID] = { .type = NLA_U32 },
|
||||
};
|
||||
|
||||
static int rtm_to_fib_config(struct net *net, struct sk_buff *skb,
|
||||
|
|
|
@ -365,8 +365,7 @@ struct dst_entry *inet_csk_route_req(struct sock *sk,
|
|||
RT_CONN_FLAGS(sk), RT_SCOPE_UNIVERSE,
|
||||
sk->sk_protocol, inet_sk_flowi_flags(sk),
|
||||
(opt && opt->opt.srr) ? opt->opt.faddr : ireq->rmt_addr,
|
||||
ireq->loc_addr, ireq->rmt_port, inet_sk(sk)->inet_sport,
|
||||
sock_i_uid(sk));
|
||||
ireq->loc_addr, ireq->rmt_port, inet_sk(sk)->inet_sport);
|
||||
security_req_classify_flow(req, flowi4_to_flowi(fl4));
|
||||
rt = ip_route_output_flow(net, fl4, sk);
|
||||
if (IS_ERR(rt))
|
||||
|
@ -399,8 +398,7 @@ struct dst_entry *inet_csk_route_child_sock(struct sock *sk,
|
|||
RT_CONN_FLAGS(sk), RT_SCOPE_UNIVERSE,
|
||||
sk->sk_protocol, inet_sk_flowi_flags(sk),
|
||||
(opt && opt->opt.srr) ? opt->opt.faddr : ireq->rmt_addr,
|
||||
ireq->loc_addr, ireq->rmt_port, inet_sk(sk)->inet_sport,
|
||||
sock_i_uid(sk));
|
||||
ireq->loc_addr, ireq->rmt_port, inet_sk(sk)->inet_sport);
|
||||
security_req_classify_flow(req, flowi4_to_flowi(fl4));
|
||||
rt = ip_route_output_flow(net, fl4, sk);
|
||||
if (IS_ERR(rt))
|
||||
|
|
|
@ -1506,8 +1506,7 @@ void ip_send_reply(struct sock *sk, struct sk_buff *skb, __be32 daddr,
|
|||
RT_SCOPE_UNIVERSE, sk->sk_protocol,
|
||||
ip_reply_arg_flowi_flags(arg),
|
||||
daddr, rt->rt_spec_dst,
|
||||
tcp_hdr(skb)->source, tcp_hdr(skb)->dest,
|
||||
arg->uid);
|
||||
tcp_hdr(skb)->source, tcp_hdr(skb)->dest);
|
||||
security_skb_classify_flow(skb, flowi4_to_flowi(&fl4));
|
||||
rt = ip_route_output_key(sock_net(sk), &fl4);
|
||||
if (IS_ERR(rt))
|
||||
|
|
|
@ -787,8 +787,7 @@ int ping_v4_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
|
|||
|
||||
flowi4_init_output(&fl4, ipc.oif, sk->sk_mark, tos,
|
||||
RT_SCOPE_UNIVERSE, sk->sk_protocol,
|
||||
inet_sk_flowi_flags(sk), faddr, saddr, 0, 0,
|
||||
sock_i_uid(sk));
|
||||
inet_sk_flowi_flags(sk), faddr, saddr, 0, 0);
|
||||
|
||||
security_sk_classify_flow(sk, flowi4_to_flowi(&fl4));
|
||||
rt = ip_route_output_flow(net, &fl4, sk);
|
||||
|
|
|
@ -567,8 +567,7 @@ static int raw_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
|
|||
RT_SCOPE_UNIVERSE,
|
||||
inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol,
|
||||
inet_sk_flowi_flags(sk) | FLOWI_FLAG_CAN_SLEEP,
|
||||
daddr, saddr, 0, 0,
|
||||
sock_i_uid(sk));
|
||||
daddr, saddr, 0, 0);
|
||||
|
||||
if (!inet->hdrincl) {
|
||||
err = raw_probe_proto_opt(&fl4, msg);
|
||||
|
|
|
@ -740,7 +740,6 @@ static inline int compare_keys(struct rtable *rt1, struct rtable *rt2)
|
|||
(rt1->rt_mark ^ rt2->rt_mark) |
|
||||
(rt1->rt_key_tos ^ rt2->rt_key_tos) |
|
||||
(rt1->rt_route_iif ^ rt2->rt_route_iif) |
|
||||
(rt1->rt_uid ^ rt2->rt_uid) |
|
||||
(rt1->rt_oif ^ rt2->rt_oif)) == 0;
|
||||
}
|
||||
|
||||
|
@ -1881,7 +1880,6 @@ void ip_rt_get_source(u8 *addr, struct sk_buff *skb, struct rtable *rt)
|
|||
fl4.flowi4_oif = rt->dst.dev->ifindex;
|
||||
fl4.flowi4_iif = skb->dev->ifindex;
|
||||
fl4.flowi4_mark = skb->mark;
|
||||
fl4.flowi4_uid = skb->sk ? sock_i_uid(skb->sk) : 0;
|
||||
|
||||
rcu_read_lock();
|
||||
if (fib_lookup(dev_net(rt->dst.dev), &fl4, &res) == 0)
|
||||
|
@ -2065,7 +2063,6 @@ static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr,
|
|||
rth->rt_iif = dev->ifindex;
|
||||
rth->rt_oif = 0;
|
||||
rth->rt_mark = skb->mark;
|
||||
rth->rt_uid = 0;
|
||||
rth->rt_gateway = daddr;
|
||||
rth->rt_spec_dst= spec_dst;
|
||||
rth->rt_peer_genid = 0;
|
||||
|
@ -2196,7 +2193,6 @@ static int __mkroute_input(struct sk_buff *skb,
|
|||
rth->rt_iif = in_dev->dev->ifindex;
|
||||
rth->rt_oif = 0;
|
||||
rth->rt_mark = skb->mark;
|
||||
rth->rt_uid = 0;
|
||||
rth->rt_gateway = daddr;
|
||||
rth->rt_spec_dst= spec_dst;
|
||||
rth->rt_peer_genid = 0;
|
||||
|
@ -2380,7 +2376,6 @@ local_input:
|
|||
rth->rt_iif = dev->ifindex;
|
||||
rth->rt_oif = 0;
|
||||
rth->rt_mark = skb->mark;
|
||||
rth->rt_uid = 0;
|
||||
rth->rt_gateway = daddr;
|
||||
rth->rt_spec_dst= spec_dst;
|
||||
rth->rt_peer_genid = 0;
|
||||
|
@ -2585,7 +2580,6 @@ static struct rtable *__mkroute_output(const struct fib_result *res,
|
|||
rth->rt_iif = orig_oif ? : dev_out->ifindex;
|
||||
rth->rt_oif = orig_oif;
|
||||
rth->rt_mark = fl4->flowi4_mark;
|
||||
rth->rt_uid = fl4->flowi4_uid;
|
||||
rth->rt_gateway = fl4->daddr;
|
||||
rth->rt_spec_dst= fl4->saddr;
|
||||
rth->rt_peer_genid = 0;
|
||||
|
@ -2837,7 +2831,6 @@ struct rtable *__ip_route_output_key(struct net *net, struct flowi4 *flp4)
|
|||
rt_is_output_route(rth) &&
|
||||
rth->rt_oif == flp4->flowi4_oif &&
|
||||
rth->rt_mark == flp4->flowi4_mark &&
|
||||
rth->rt_uid == flp4->flowi4_uid &&
|
||||
!((rth->rt_key_tos ^ flp4->flowi4_tos) &
|
||||
(IPTOS_RT_MASK | RTO_ONLINK)) &&
|
||||
net_eq(dev_net(rth->dst.dev), net) &&
|
||||
|
@ -2919,7 +2912,6 @@ struct dst_entry *ipv4_blackhole_route(struct net *net, struct dst_entry *dst_or
|
|||
rt->rt_iif = ort->rt_iif;
|
||||
rt->rt_oif = ort->rt_oif;
|
||||
rt->rt_mark = ort->rt_mark;
|
||||
rt->rt_uid = ort->rt_uid;
|
||||
|
||||
rt->rt_genid = rt_genid(net);
|
||||
rt->rt_flags = ort->rt_flags;
|
||||
|
@ -3017,9 +3009,6 @@ static int rt_fill_info(struct net *net,
|
|||
if (rt->rt_mark)
|
||||
NLA_PUT_BE32(skb, RTA_MARK, rt->rt_mark);
|
||||
|
||||
if (rt->rt_uid != (uid_t) -1)
|
||||
NLA_PUT_BE32(skb, RTA_UID, rt->rt_uid);
|
||||
|
||||
error = rt->dst.error;
|
||||
if (peer) {
|
||||
inet_peer_refcheck(rt->peer);
|
||||
|
@ -3139,7 +3128,6 @@ static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr* nlh, void
|
|||
.flowi4_tos = rtm->rtm_tos,
|
||||
.flowi4_oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0,
|
||||
.flowi4_mark = mark,
|
||||
.flowi4_uid = tb[RTA_UID] ? nla_get_u32(tb[RTA_UID]) : current_uid(),
|
||||
};
|
||||
rt = ip_route_output_key(net, &fl4);
|
||||
|
||||
|
|
|
@ -352,8 +352,7 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb,
|
|||
RT_SCOPE_UNIVERSE, IPPROTO_TCP,
|
||||
inet_sk_flowi_flags(sk),
|
||||
(opt && opt->srr) ? opt->faddr : ireq->rmt_addr,
|
||||
ireq->loc_addr, th->source, th->dest,
|
||||
sock_i_uid(sk));
|
||||
ireq->loc_addr, th->source, th->dest);
|
||||
security_req_classify_flow(req, flowi4_to_flowi(&fl4));
|
||||
rt = ip_route_output_key(sock_net(sk), &fl4);
|
||||
if (IS_ERR(rt)) {
|
||||
|
|
|
@ -931,8 +931,7 @@ int udp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
|
|||
flowi4_init_output(fl4, ipc.oif, sk->sk_mark, tos,
|
||||
RT_SCOPE_UNIVERSE, sk->sk_protocol,
|
||||
inet_sk_flowi_flags(sk)|FLOWI_FLAG_CAN_SLEEP,
|
||||
faddr, saddr, dport, inet->inet_sport,
|
||||
sock_i_uid(sk));
|
||||
faddr, saddr, dport, inet->inet_sport);
|
||||
|
||||
security_sk_classify_flow(sk, flowi4_to_flowi(fl4));
|
||||
rt = ip_route_output_flow(net, fl4, sk);
|
||||
|
|
|
@ -86,7 +86,6 @@ static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
|
|||
xdst->u.rt.rt_iif = fl4->flowi4_iif;
|
||||
xdst->u.rt.rt_oif = fl4->flowi4_oif;
|
||||
xdst->u.rt.rt_mark = fl4->flowi4_mark;
|
||||
xdst->u.rt.rt_uid = fl4->flowi4_uid;
|
||||
|
||||
xdst->u.dst.dev = dev;
|
||||
dev_hold(dev);
|
||||
|
|
|
@ -708,7 +708,6 @@ int inet6_sk_rebuild_header(struct sock *sk)
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_dport = inet->inet_dport;
|
||||
fl6.fl6_sport = inet->inet_sport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
|
||||
|
||||
rcu_read_lock();
|
||||
|
|
|
@ -160,7 +160,6 @@ ipv4_connected:
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_dport = inet->inet_dport;
|
||||
fl6.fl6_sport = inet->inet_sport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
|
||||
if (!fl6.flowi6_oif && (addr_type&IPV6_ADDR_MULTICAST))
|
||||
fl6.flowi6_oif = np->mcast_oif;
|
||||
|
|
|
@ -74,7 +74,6 @@ struct dst_entry *inet6_csk_route_req(struct sock *sk,
|
|||
fl6.flowi6_mark = inet_rsk(req)->ir_mark;
|
||||
fl6.fl6_dport = inet_rsk(req)->rmt_port;
|
||||
fl6.fl6_sport = inet_rsk(req)->loc_port;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_req_classify_flow(req, flowi6_to_flowi(&fl6));
|
||||
|
||||
dst = ip6_dst_lookup_flow(sk, &fl6, final_p, false);
|
||||
|
@ -226,7 +225,6 @@ int inet6_csk_xmit(struct sk_buff *skb, struct flowi *fl_unused)
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_sport = inet->inet_sport;
|
||||
fl6.fl6_dport = inet->inet_dport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
|
||||
|
||||
rcu_read_lock();
|
||||
|
|
|
@ -163,7 +163,6 @@ int ping_v6_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_icmp_type = user_icmph.icmp6_type;
|
||||
fl6.fl6_icmp_code = user_icmph.icmp6_code;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
|
||||
|
||||
if (!fl6.flowi6_oif && ipv6_addr_is_multicast(&fl6.daddr))
|
||||
|
|
|
@ -762,7 +762,6 @@ static int rawv6_sendmsg(struct kiocb *iocb, struct sock *sk,
|
|||
memset(&fl6, 0, sizeof(fl6));
|
||||
|
||||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
|
||||
if (sin6) {
|
||||
if (addr_len < SIN6_LEN_RFC2133)
|
||||
|
|
|
@ -2269,7 +2269,6 @@ static const struct nla_policy rtm_ipv6_policy[RTA_MAX+1] = {
|
|||
[RTA_IIF] = { .type = NLA_U32 },
|
||||
[RTA_PRIORITY] = { .type = NLA_U32 },
|
||||
[RTA_METRICS] = { .type = NLA_NESTED },
|
||||
[RTA_UID] = { .type = NLA_U32 },
|
||||
};
|
||||
|
||||
static int rtm_to_fib6_config(struct sk_buff *skb, struct nlmsghdr *nlh,
|
||||
|
@ -2582,10 +2581,8 @@ static int inet6_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr* nlh, void
|
|||
if (tb[RTA_OIF])
|
||||
oif = nla_get_u32(tb[RTA_OIF]);
|
||||
|
||||
if (tb[RTA_UID])
|
||||
fl6.flowi6_uid = nla_get_u32(tb[RTA_UID]);
|
||||
else
|
||||
fl6.flowi6_uid = (iif ? (uid_t) -1 : current_uid());
|
||||
if (tb[RTA_MARK])
|
||||
fl6.flowi6_mark = nla_get_u32(tb[RTA_MARK]);
|
||||
|
||||
if (iif) {
|
||||
struct net_device *dev;
|
||||
|
|
|
@ -246,7 +246,6 @@ struct sock *cookie_v6_check(struct sock *sk, struct sk_buff *skb)
|
|||
fl6.flowi6_mark = inet_rsk(req)->ir_mark;
|
||||
fl6.fl6_dport = inet_rsk(req)->rmt_port;
|
||||
fl6.fl6_sport = inet_sk(sk)->inet_sport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_req_classify_flow(req, flowi6_to_flowi(&fl6));
|
||||
|
||||
dst = ip6_dst_lookup_flow(sk, &fl6, final_p, false);
|
||||
|
|
|
@ -252,7 +252,6 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_dport = usin->sin6_port;
|
||||
fl6.fl6_sport = inet->inet_sport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
|
||||
opt = rcu_dereference_protected(np->opt, sock_owned_by_user(sk));
|
||||
final_p = fl6_update_dst(&fl6, opt, &final);
|
||||
|
@ -407,7 +406,6 @@ static void tcp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
|
|||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.fl6_dport = inet->inet_dport;
|
||||
fl6.fl6_sport = inet->inet_sport;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
|
||||
|
||||
dst = ip6_dst_lookup_flow(sk, &fl6, NULL, false);
|
||||
|
@ -500,7 +498,6 @@ static int tcp_v6_send_synack(struct sock *sk, struct request_sock *req,
|
|||
fl6.flowi6_mark = inet_rsk(req)->ir_mark;
|
||||
fl6.fl6_dport = inet_rsk(req)->rmt_port;
|
||||
fl6.fl6_sport = inet_rsk(req)->loc_port;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
security_req_classify_flow(req, flowi6_to_flowi(&fl6));
|
||||
|
||||
opt = np->opt;
|
||||
|
|
|
@ -1089,7 +1089,6 @@ do_udp_sendmsg:
|
|||
fl6.flowi6_oif = np->sticky_pktinfo.ipi6_ifindex;
|
||||
|
||||
fl6.flowi6_mark = sk->sk_mark;
|
||||
fl6.flowi6_uid = sock_i_uid(sk);
|
||||
|
||||
if (msg->msg_controllen) {
|
||||
opt = &opt_space;
|
||||
|
|
Loading…
Reference in a new issue